× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hi Beth,

Thanks for the post.

So if I want to implement private key/public key encryption, where as i 
understand it, the public key encrypts the data and the private key unencrypts 
it, ( and the reverse where the private key encrypts and the public key 
unencrypts ), ....  the CIPHER operation will do this?

Is that how ssl and vpn encryption work:  public key and private key?

If so, could you specify which CIPHER algorithm is used, or is most common?

Also, the encryption key lgth.  Is that what the bit nbrs ( 56 bit, 128 bit, 
... ) refer to?  Are there still laws that limit the nbr of bits?

If you have any code samples, I would be interested in seeing them.

Thanks,

Steve Richter


---------- Original Message ----------------------------------
From: "Beth Hagemeister" <hag@us.ibm.com>
Reply-To: mi400@midrange.com
Date: Tue, 21 Aug 2001 11:44:05 -0500

>This is a multipart message in MIME format.
>--
>[ Picked text/plain from multipart/alternative ]
>For your information -
>
>In v5r1 several new algorithms were added under the CIPHER MI instruction,
>which now supports the following:
>
>DES - Functions: encrypt, decrypt, MAC.  Key: 56-bit. Modes: ECB, CBC,
>OFB, CFB 1-bit, CFB 8-bit, CFB64-bit.  Padding. Requires installation of
>AC2 or AC3 LP.
>
>TDES - Functions: encrypt, decrypt, MAC.  Key: 56-bit, 112-bit, 168-bit.
>Modes: ECB, CBC, OFB, CFB 1-bit, CFB 8-bit, CFB64-bit.  Padding. Requires
>installation of AC2 (56-bit key - equivalent to single DES) or AC3 LP.
>
>RC4compatible - Functions: encrypt, decrypt. Key: 1-256 bytes.
>
>AES - Functions: encrypt, decrypt, MAC.  Key: 128-bit. Modes: ECB, CBC.
>Block size: 16, 24, 32 bytes.  Requires installation of AC3 LP.  Warning:
>AES algorithm and modes are not yet approved standards and could change in
>the future.
>
>MD5 - Functions: hash, HMAC.
>
>SHA1 - Functions: hash, HMAC.
>
>crypt(3) - This is a string encryption algorithm used on UNIX systems for
>password authentication.  It is based on DES.
>
>pseudorandom number generator - Functions: generate numbers, add seed.
>These functions are also available via 2 new APIs.  Uses FIPS 186-1
>algorithm.  Collects seed automatically and will use a 4758 crypto card if
>one is available on the system.
>
>The QSYSINC/MIH.CIPHER header file has been updated to reflect these new
>algorithms.
>
>Beth Hagemeister
>iSeries Cryptographic Services
>_______________________________________________
>This is the MI Programming on the AS400 / iSeries (MI400) mailing list
>To post a message email: MI400@midrange.com
>To subscribe, unsubscribe, or change list options,
>visit: http://lists.midrange.com/cgi-bin/listinfo/mi400
>or email: MI400-request@midrange.com
>
>


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.